Journal: Secur. Priv.

Volume 8, Issue 5

0 -- 0Rajat Sood, Anamika Sharma, Ashima Anand. Encryption-Based Twining of Visible and Invisible Watermarking for Secure Transmission of Medical Images
0 -- 0Roben A. Juanatas, Ahmad S. Almadhor, Shtwai Alsubai, Natalia Kryvinska, Moez Krichen, Gabriel Avelino R. Sampedro, Sidra Abbas. Securing Realistic IoMT Environment Using Moth-Flame Optimization-Based Deep Learning Framework
0 -- 0Zhen Li, Jia Hu. Application of Random Forest Model in Predictive Analysis of Network Security Big Data
0 -- 0Shabbab Ali Algamdi, Abdul Wahid Khan, Jamshid Ahmad. A Cyber Security Awareness Model for Distributed Teams
0 -- 0Ajay Kakkar, Indu Batra. Performance Analysis of a Lightweight Image Re-Encryption Scheme for 5G HetNets
0 -- 0Khushboo Gupta, Vinod Kumar 0013, Ram Prakash, Om Pal, Sanjiv Sharma. SAKM: A Scalable and Adaptive Key Management for Securing Demand-Response Bidirectional Communications in AMI of Next-Generation Smart Grids
0 -- 0Yang Lei. Mass Estimation and Protection of Network Security Using Inception-LSTM and Bayesian Attack Behavior Correlation
0 -- 0Wencheng Lin. Design of a Multimodal Network Data Security Detection Model Based on Self-Supervised Learning
0 -- 0Gabriele Cianfarani, Natalija Vlajic, Robert Noce. Automated Risk-Based Cryptoperiod Calculation in ICSs: Analytical Framework and Software Tool
0 -- 0Anil, Gunjan Ansari. Securing Cloud Data With a Blockchain: Innovating AES Encryption via Modified Sine Map Rounds
0 -- 0Siqi Peng, Yao Peng. Optimization of Malware Detection and Defense Algorithm Based on Hybrid Convolutional Graph Neural Network

Volume 8, Issue 4

0 -- 0Deepti Saraswat, Manik Lal Das, Sudeep Tanwar. VeriProd: A Privacy-Preserving and Verifiable FL Framework for Secure Aggregation and Dropout Resilience
0 -- 0Mahbubun Nahar, A. H. M. Kamal. DNA Steganography to Enhance Security in Banking Sector
0 -- 0Meysam Ghahramani. Privacy Dream: A Malware Propagation-Inspired Attack on Authentication Protocols
0 -- 0Fursan Thabit, Ozgu Can, Chrysostomos Chrysostomou. Enhancing Data Security With Adaptive ECC-Based Encryption: A Resource-Aware Approach
0 -- 0Hong Li, Shuang Liu, Taiyue Tang. User Data Privacy Protection Based on Machine Learning and Encryption Algorithms
0 -- 0Daassa Asma, Nesrine Missaoui, Mohsen Machhout, Sonia Ayachi Ghannouchi. Access Control in BPMSs: A Case Study for Building a Privacy-Preserving COVID-19 Process in Bonita
0 -- 0Sruthi Krishnan, Manohar Naik S. An Efficient Framework for Phishing URL Detection Using Adaptive Drift-Aware Feature Monitoring and Online Learning
0 -- 0Aarav Ashish Mehrishi, Dipti Kapoor Sarmah, Maya Daneva. How Can Cryptography Secure Online Assessments Against Academic Dishonesty?
0 -- 0Deepak Kumar, P. Anitha, J. Murugachandravel, S. Jeevitha, A. Bhuvanesh, Priyanka Pramod Pawar. Banking Fraud Detection Using Optimized Enhanced Stacked Autoencoder Approach
0 -- 0Mohammed Riyadh Abdmeziem, Amina Ahmed-Nacer. Leveraging IoT and LLM for Depression and Anxiety Disorders: A Privacy Preserving Perspective
0 -- 0. Correction to "Attack Detection in Internet of Medical Things Through Ensemble Machine Learning Models"
0 -- 0Mukesh Singh, Siddhant Thapliyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das. Designing Generative AI-Envisioned Security Scheme for Server Attacks Protection
0 -- 0Weigang Zhang. Network Security Situation Prediction Model Based on Neural Network and Gated Recurrent Unit
0 -- 0Swapnil Singh, Deepa Krishnan, Pratham Dedhiya, Vinayakumar Ravi, Darshil Sanghvi, Kamakshya Nanda. Comprehensive Analysis of Supervised Machine Learning Algorithms in Obfuscated Malware Detection
0 -- 0Chengman Wang. A Mathematical Model for Wireless Network Security Posture Prediction Based on Optimized Neural Network Algorithm
0 -- 0Shahida Hafeezan Qureshi, Saif Ur Rehman Malik, Junaid Haseeb, Syed Atif Moqurrab, Tanvir Fatima Naik Bukht, Gautam Srivastava 0001. Towards Sustainable IoT: A Digital Signature-Enhanced Federated Learning Approach
0 -- 0Naga Sravanthi Puppala. Mitigating Malicious Activities in Blockchain Mining: The Role of Reputation-Based Protocol
0 -- 0R. Shashidhar, M. P. Shashank, Vinayakumr Ravi, Alanoud Al Mazroa. Audio and Visual Speech for the Biometric Security System
0 -- 0Fatemeh Stodt, Mohammed B. Alshawki, Christoph Reich, Péter Ligeti, Fabrice Theoleyre. Securing the Future: Lightweight Blockchain Solutions for IIoT and IoT Networks
0 -- 0Hongbo Liu. Security Technology of Unmanned Cluster Communication Network Based on Physical Layer Key Generation Technology
0 -- 0Aqeel Ejaz, Ghulam Murtaza, Takreem Haider, Naveed Ahmed Azam, Umar Hayat. An Efficient S-Box Generation With Mutation Optimization for Secure Image Encryption
0 -- 0B. Pradeep Kumar Reddy, Ayantika Chatterjee. SMLaaS: Secure Machine Learning as a Service Ensuring Data and Model Parameter Privacy
0 -- 0Zaed S. Mahdi, Rana M. Zaki, Laith Alzubaidi. A Secure and Adaptive Framework for Enhancing Intrusion Detection in IoT Networks Using Incremental Learning and Blockchain

Volume 8, Issue 3

0 -- 0Zaheen Fatima, Rashid Hussain, Azhar Dilshad, Muhammad Shakir, Asif Ali Laghari. Explainable AI-Driven Firewall Evaluation: Empowering Cybersecurity Decision-Making for Optimal Network Defense
0 -- 0Hakeem Babalola Akande, Agbotiname Lucky Imoize, Temitayo C. Adeniran, Cheng-Chi Lee, Joseph Bamidele Awotunde. RF-FLIDS: A Novel Hybrid Intrusion Detection Model for Enhanced Anomaly Detection in IoT Networks
0 -- 0Zhiying Hu 0004, Lifeng Wang, Xiaomei Ding, Lihong Zhao, Minghe Xue. Multimodal Data Fusion Defense Strategy for Campus Network Security: Research on Kolmogorov Arnold Networks Combined With B-Spline Function
0 -- 0Lixin Jiang. A Network Anomaly Traffic Detection Method Based on CNN-LSTM
0 -- 0Huihui Shi, Hua Shi. Financial Management and Data Sharing of Enterprise Engineering Projects Based on Blockchain Technology
0 -- 0Karunya R. V., Samyuktha Ganesh, Muralidharan D, G. R. Brindha, Muthu Thiruvengadam. Credit Card Fraud Data Analysis and Prediction Using Machine Learning Algorithms
0 -- 0Shtwai Alsubai, Gabriel Avelino R. Sampedro, Ahmad S. Almadhor, Vincent Karovic, Abdullah Alqahtani 0001, Sidra Abbas. Small-UAV GPS Spoofing Attack Detection and Multilabel Classification
0 -- 0G. A. Thushara, S. Mary Saira Bhanu. A Blockchain-Assisted Attribute-Based Signcryption for Secure Sharing of Medical IoT Data in Fog Environment
0 -- 0Shahnwaz Afzal, Mohammad Ubaidullah Bokhari. LightAgriCrypt: A Novel Lightweight Stream Cipher for Enhancing Security in Smart Agriculture Systems
0 -- 0Yuchen Fu, Zhenhui Li, Feng Huang, Wang Ning, Haoran Lyu. Design of a Fast Image Encryption Algorithm Based on a Novel 2D Chaotic Map and DNA Encoding
0 -- 0Kruthika S. G., Trisiladevi C. Nagavi, P. Mahesha, Chethana H. T., Vinayakumar Ravi, Alanoud Al Mazroa. Identification of Suspect Using Transformer and Cosine Similarity Model for Forensic Voice Comparison
0 -- 0Aarushi, Abhay Chauhan, Savita Wadhawan, Amanpreet Kaur, Sparsh Sharma. The Convergence of Blockchain and IoT in Secure Smart Cities: A Survey of Applications, Challenges, and Opportunities
0 -- 0C. Suganthi Evangeline, Vinoth Babu Kumaravelu, Arthi Murugadass, Agbotiname Lucky Imoize, Poongundran Selvaprabhu, J. Naskath. BSHR-FA: A Blockchain-Enabled Secure Hierarchical Routing Using Firefly Algorithm for VANETs
0 -- 0R. Lalduhsaka, Ajoy Kumar Khan. Enhanced Intrusion Detection System Using a Two-Staged Feature Selection Method
0 -- 0Ravi Sharma, Nonita Sharma, Sachi Nandan Mohanty. Attack Detection in Internet of Medical Things Through Ensemble Machine Learning Models
0 -- 0Oluwadamilare Harazeem Abdulganiyu, Taha Ait Tchakoucht, Yakub Kayode Saheed, Meryam El Mouhtadi, Ahmed El Hilali Alaoui. Modified Variational Autoencoder and Attention Mechanism-Based Long Short-Term Memory for Detecting Intrusions in Imbalanced Network Traffic
0 -- 0. Correction to "Cascading Bagging and Boosting Ensemble Methods for Intrusion Detection in Cyber-Physical Systems"
0 -- 0Mithun Palani, Anitha Perumalsamy. Next-Gen Deepfake Detection: ResNet-Swish-BiLSTM Model to Deliver Superior Accuracy in Visual Forensics
0 -- 0Hongxuan Hu, Liang Ding, Guoyang Lu, Xiaobin Cai, Zonghui Wang. Malware Detection Method Based on Adversarial Samples and a Hybrid Model
0 -- 0Mohammed Mahyoub, AbdulAziz AbdulGhaffar, Emmanuel Dare Alalade, Ashraf Matrawy. A Security-Aware Network Function Sharing Model for 5G Slicing
0 -- 0Ram Ji, Neerendra Kumar, Devanand Padha. Optimized Intrusion Detection Approach for Cyber-Physical System Using Meta-Learning With Stacked Generalization: An Ensemble Learning Inspired Approach

Volume 8, Issue 2

0 -- 0. Correction to "Software-Defined Networks-Enabled Fog Computing for IoT-Based Healthcare: Security, Challenges, and Opportunities"
0 -- 0Hamidreza Fereidouni, Olga Fadeitcheva, Mehdi Zalai. IoT and Man-in-the-Middle Attacks
0 -- 0Guoliang He. Construction of Computer Network Security Monitoring Platform Based on Intelligent Sensor Technology
0 -- 0Ahmed Hawana, Emad S. Hassan, Walid El Shafai, Sami A. El-Dolil 0001. Enhancing Malware Detection With Deep Learning Convolutional Neural Networks: Investigating the Impact of Image Size Variations
0 -- 0Tian Li, Qiu-yu Zhang, Guo-rui Wu. Image Traceable Privacy Protection Scheme Based on Blockchain and Homomorphic Encryption
0 -- 0Abeer Qashou, Nurhidayah Bahar, Hazura Mohamed. Qualitative Exploration of Data Security Risks in Mobile Cloud Computing for Higher Education
0 -- 0Sudheesh K. V., S. Benaka Santhosha, Kiran Puttegowda, Vinayakumar Ravi, Alanoud Al Mazroa. A High-Security Chaotic Encryption Model for Biomedical Image Protection
0 -- 0D. J. Joel Devadass Daniel, Jagadeesh S. A Secure Data Storage Architecture for Internet of Things Using a Hybrid Whale-Based Harris Hawk Optimization Algorithm and Fuzzy-Based Secure Clustering
0 -- 0Chethana H. T., Trisiladevi C. Nagavi, P. Mahesha, Vinayakumar Ravi, Alanoud Al Mazroa. Face Recognition in Unconstrained Images Using Deep Learning Model for Forensics
0 -- 0Zakir Ahmad Sheikh, Narinder Verma, Yashwant Singh, Sudeep Tanwar, Abdulatif Alabdulatif. Generalizability Assessment of Learning-Based Intrusion Detection Systems for IoT Security: Perspectives of Data Diversity
0 -- 0Garima Verma. A Secure Blockchain-Based Health Prediction Framework Using Mantaray Optimization
0 -- 0Hassan Mohammadi, Soodeh Hosseini. Mobile Botnet Attacks Detection Using Supervised Learning Algorithms
0 -- 0Hanbing Yu, Qiju Zhang. Toward Efficient Secure Threat Information Analysis in Cyber-Physical Systems
0 -- 0Ashutosh Tripathi, Kusum Kumari Bharti, Mohona Ghosh. An Efficient Algorithm for Exploitative Monetization Scam Video Detection Over Social Media Platforms
0 -- 0Najah K. Almazmomi. Advanced Persistent Threat Detection Using Optimized and Hybrid Deep Learning Approach
0 -- 0Dulam Devee Sivaprasad, Mohamed Sirajudeen Yoosuf. Privacy-Centric Signature Classification for Secure Educational Certificate Authentication
0 -- 0Daniel Kwame Amissah, Winfred Yaokumah, Edward Danso Ansong, Justice Kwame Appati. Evaluating Dimensionality Reduction Techniques in Bitcoin Ransomware Detection: Comparative Analysis of Incremental PCA and UMAP
0 -- 0Pralabh Agarwal, Mohammad Wazid, Vishal Kumar Singh, Anindya Srivastava, Arshal Raj Singh, Saksham Mittal, Ashok Kumar Das. BCIDS-IoT: A Binary Classification Intrusion Detection Scheme for Internet of Things Communication
0 -- 0Ankur Gupta 0001, Pranshav Patel, Krisha Darji, Fenil Ramoliya, Rajesh Gupta 0007, Sudeep Tanwar, Karan Khajuria, Deepak Garg 0002. MetaPrism: Intelligent Personalized Engagement Policy for User's Security and Privacy in Metaverse Environment
0 -- 0Buchammagari Avinash Reddy, Kshira Sagar Sahoo, Monowar H. Bhuyan. Toward Mitigation of Flow Table Modification Attacks in P4-Based SDN Data Plane
0 -- 0Ahmed Almuhairat, Adel Alti, Boubakeur Annane. Unified Central Bank Blockchain for Improving Accounting Bank Performance in Jordan
0 -- 0Siranjeevi Rajamanickam, Satyanarayana Vollala, Natarajan Ramasubramanian. EEAPTMS: Enhanced ECC Based Authentication Protocol for Telemedical Scenario
0 -- 0Deyou Chen. Network Intrusion Detection Technology Integrating Density Peak Clustering Algorithm and Improved Bi-Directional LSTM

Volume 8, Issue 1

0 -- 0Tao Tan, LiMing Zhang, Shuaikang Liu, Lei Wang. An Encryption Algorithm Based on Public-Key Cryptosystems for Vector Map
0 -- 0Suryya Farhat, Manoj Kumar, Anshul Srivastava, Shilpi Bisht, Vinay Rishiwal, Mano Yadav. Enhancing E-Healthcare Data Privacy Through Efficient Dual Signature on Twisted Edwards Curves Encryption Decryption
0 -- 0Victor R. Kebande, Richard Adeyemi Ikuesan. Standardizing Industrial Internet of Things (IIoT) Forensic Processes
0 -- 0Mohd Shadab, Md Saquib Jawed, Mohammad Sajid. Substitution Box Construction Using Transfer-Function Assisted Metaheuristic and Booster Algorithm: A Hybrid Approach
0 -- 0Ehtesham Safeer, Sidra Tahir, Asif Nawaz, Mamoona Humayun, Momina Shaheen, Maqbool Khan. Advanced hybrid malware identification framework for the Internet of Medical Things, driven by deep learning
0 -- 0Changrong Li, Wei Duan, Zhenfu Li. Deep Learning-Based Community Detection Attack: Arctic Shipping Data as a Case
0 -- 0Bhomik M. Gandhi, Shruti B. Vaghadia, Malaram Kumhar, Rajesh Gupta 0007, Nilesh Kumar Jadav, Jitendra Bhatia, Sudeep Tanwar, Abdulatif Alabdulatif. Homomorphic Encryption and Collaborative Machine Learning for Secure Healthcare Analytics
0 -- 0Liang Chen, Cheng Zeng, Stilianos Vidalis, Wei Jie. Managing Obligation Delegation: Incentive Model and Experiment
0 -- 0Gagan Dangwal, Mohammad Wazid, Sarah Nizam, Vinay Chamola, Ashok Kumar Das. Automotive Cybersecurity Scheme for Intrusion Detection in CAN-Driven Artificial Intelligence of Things
0 -- 0Shyam R. Sihare. Guided and unguided approaches for quantum key distribution for secure quantum communication
0 -- 0Rasim Alguliyev, Ramiz Shikhaliyev. Computer Networks Cybersecurity Monitoring Based on Deep Learning Model
0 -- 0Dhananjay Kumar Singh, Diwakar Bhardwaj. An EAADE: Effective Authentication Approach for Data Exchange in Vehicular Social Network for IoV
0 -- 0Mohammad Wazid, Shivansh Nautiyal, Ashok Kumar Das, Sachin Shetty, SK Hafizul Islam. A Secure Authenticated Healthcare Data Analysis Mechanism in IoMT-Enabled Healthcare
0 -- 0Elham Asadi, Soodeh Hosseini. Modeling of Malware Propagation Under the Clustering Approach in Scale-Free Networks
0 -- 0Maciej Rys, Agata Slusarek, Krzysztof Zielinski. Caught Off Guard: When Experts Fall for Quishing, Is Awareness Enough?
0 -- 0Doina Gavrilov. Exploring Novel Frontiers in Online Privacy Ethics
0 -- 0Shuhui Su, Yonghan Luo, Tao Li, Qi Chen, Juntao Liang. Anti-Leakage Method of Sensitive Information of Network Documents Based on Differential Privacy Model
0 -- 0Abdallah Alshantti, Adil Rasheed, Frank Westad. Privacy Re-Identification Attacks on Tabular GANs
0 -- 0R. Shashidhara, Renju C. Nair, Pavan Kumar Panakalapati. Promise of Zero-Knowledge Proofs (ZKPs) for Blockchain Privacy and Security: Opportunities, Challenges, and Future Directions
0 -- 0Jun-Won Ho. Game Theoretic Approach Toward Detection of Input-Driven Evasive Malware in the IoT
0 -- 0Reza Mohammadi 0005, Mohammad Mehdi Hosseini, R. Bahrami. Uncovering security vulnerabilities through multiplatform malware analysis
0 -- 0Nitin Rathore, Aparna Kumari, Margi Patel, Alok Chudasama, Dhyey Bhalani, Sudeep Tanwar, Abdulatif Alabdulatif. Synergy of AI and Blockchain to Secure Electronic Healthcare Records
0 -- 0Raja Sekar Jayaram, Dinesh Balajothi, Deepu Natchirajan. Improved Mobile Security Based on Two-Factor Authentication
0 -- 0Mehdi Darbandi, Ali Ehsani, Farzad Bahrami, Elham Moghadamnia, Karlo Abnoosian, Bayan Omar Mohammed. A New Feature-Based Biometric Identification System in IoT-Powered Smart Cities Using a Hybrid Optimization Algorithm
0 -- 0Shipra Ravi Kumar, Mukta Goyal. Design of an Iterative Method for Blockchain Optimization Incorporating DeepMiner and AnoBlock
0 -- 0Yunus Emre Göktepe, Yusuf Uzun. IDDLE: A Novel Deep Learning-Based Approach for Intrusion Detection Problem Using Feature Extraction
0 -- 0Mohamed Ilies Taleb, Mustapha Benssalah. UAV Jamming Localization Against Random Eavesdropper Positions Using Cuckoo Search Algorithm
0 -- 0Rajendra Prasad Nayak, Sourav Kumar Bhoi, Kshira Sagar Sahoo, Srinivas Sethi, Subasish Mohapatra, Monowar H. Bhuyan. Unveiling Sybil Attacks Using AI-Driven Techniques in Software-Defined Vehicular Networks